After reading the Wikis (thanks Stephen) this is what I done:
#set sarg to look for dansguardian log
[root@gateway1 bin]# /usr/bin/sarglog dansguardian
sarg to use dansguardian logs
# Force dansguardian to use squid log format from panel
# Ensure that everything is logged, not just blocked sites (the default).
# Note:
[root@gateway1 ~]# config show sarg logfile
sarg=service
language=English
logfile=squid
values=bytes
If not:
[root@gateway1 ~]# config setprop sarg logfile squid
[root@gateway1 ~]# config show sarg logfile
sarg=service
language=English
logfile=squid
values=abbreviation
# Expand:
[root@gateway1 ~]# /usr/bin/sarglog
useage
sarglog (squid|dansguardian)
[root@gateway1 ~]# /usr/bin/sarglog dansguardian
sarg to use dansguardian logs
To test, you can access a few sites, including sites which you know will be blocked by Dans.
#Do a manual update:
[root@gateway1 ~]# /usr/bin/sarg
SARG: Records in file: 4658, reading: 100.00%
Check the "One shot report" (takes a while to appear, wait...)
Its all there, including a new section for Dansguardian, you will also see which sitew have been blocked, with dates, time, etc. I am running transparent proxy, so of course users are not displayed, but IP addresses are.